Blog Posts Tagged with "internet"
December 13, 2012 Added by:Electronic Frontier Foundation
It shouldn't be controversial to demand evidence-based policies in the copyright space. But Congress has failed to engage in an informed discussion over which copyright policies advance the public interest, and which ones cause harm. That's why we're supporting our friends at Fight for the Future...
December 04, 2012 Added by:Electronic Frontier Foundation
We live in an interconnected world, and America's actions on the world stage affect us strongly here at home. Take action now to demand that the U.S. government open up the TPP drafts to the public, and that the government negotiate for your interests - not the entertainment companies'...
November 30, 2012 Added by:Jeffrey Carr
When the New York Times released its story that some of the Syrian government's websites were hosted outside of Syria, I wasn't surprised to see SoftLayer as one of the hosts. They are the company that hosted StopGeorgia.ru, the Russian forum which coordinated many of the cyber attacks...
October 28, 2012 Added by:Electronic Frontier Foundation
Internet companies under the CleanIT regime would not only be allowed, but in fact obligated to store communications containing “terrorist content,” even when it has been removed from their platform, in order to supply the information to law enforcement agencies...
October 05, 2012 Added by:Pierluigi Paganini
Iran was recently blamed for attacks onoil companies and banks. This time the scenario appears reversed, as attacks targeted Iranian infrastructure and communications, causing serious damages to Internet connections...
October 03, 2012 Added by:Doug DePeppe
In the West, we tout the openness of the Internet. Many attribute the Internet as playing a major part in the Arab Spring. The dark underbelly of the Internet, however, is that all this connectivity allows bad actors to connect to any target he desires...
September 23, 2012 Added by:Theresa Payton
What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...
September 16, 2012 Added by:Ben Rothke
In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, history is repeating itself. Web 3.0 is turning into an Orwellian infrastructure where the ruling party wields total power over the inhabitants...
September 13, 2012 Added by:Joel Harding
In every war, civilians are the victims. If and when a nation state unleashes their cyber forces against another, the initial blow will most likely be crushing. The economy will grind to an immediate halt, and without communications most of what we know will cease to exist...
September 10, 2012 Added by:Rafal Los
Air-gapped networks are difficult to maintain, and what happens when you have to transfer data from that air-gapped network to somewhere else. What if you have to install printer drivers or update your anti-virus signatures? Doesn't sound so easy to do now, does it?
August 31, 2012 Added by:Dan Dieterle
The “Deep Web”, Dark Web or hidden internet, is a massive collection of sites and databases that don’t show up in standard search engines. So, is this a place that you want ANYONE on your corporate network to visit? NO WAY. Though many use Tor for legitimate purposes, the deep web just isn’t that kind of place...
August 30, 2012 Added by:Brent Huston
Sadly, many web crawlers and index bots do not honor the rules of robots.txt. Nor do attackers who are indexing your site for a variety of attack reasons. Given the impacts that some of these indexing tools can have on bandwidth, CPU use or database connectivity, other options for blocking them are sometimes sought...
August 27, 2012 Added by:Headlines
“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."
August 24, 2012 Added by:Theresa Payton
Facebook’s software isn’t just about placing a name with a face. If you think about how people use the like button, connect to groups, connect to each other, a tagged photo gives additional context. Hackers would love to have this information about you...
August 14, 2012 Added by:Brent Huston
"Watch the scams and traps that are strewn like land mines throughout the site. Watch the free give-aways, be wary of clicking on pictures and videos and look carefully at any messages that contain links or suggest web sites to visit. Also, be VERY careful about ‘friends’ of friends..."
August 13, 2012 Added by:Ben Rothke
Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...
FTC to Link Do-Not-Track and Big Data Concer... Zaid Zia on 11-21-2014
Why You Shouldn’t Use the OWASP Top 10 as ... Jessica Barden on 11-21-2014
Security or Checking a Box?... Fadvad FAscvax on 11-21-2014